共 25 条
[1]
WOOD A D, STANKOVIC J A., Denial of service in sensor networks, Computer, 35, 10, pp. 54-62, (2002)
[2]
RAYMOND D R, MARCHANY R C, BROWNFIELD M I, Et al., Effects of denial-of-sleep attacks on wireless sensor network MAC protocols, IEEE Transactions on Vehicular Technology, 58, 1, pp. 367-380, (2009)
[3]
RADOSAVAC S, CARDENAS A A, BARAS J S, Et al., Detecting IEEE 802.11 MAC layer misbehavior in ad hoc networks: robust strategies against individual and colluding attackers, Journal of Computer Security, 15, pp. 103-128, (2007)
[4]
KARLOF C, WAGNER D., Secure routing in wireless sensor networks: attacks and countermeasures, Ad Hoc Networks, 1, pp. 293-315, (2003)
[5]
RADOSAVAC S, BENAMMAR N, BARAS J., Cross-layer attacks in wireless ad hoc networks, Proceedings of Conference on Information Science and Systems, pp. 1266-1271, (2004)
[6]
BIAN K G, PARK J M, CHEN R L., Stasis trap: cross-layer stealthy attack in wireless ad hoc networks, Proceedings of IEEE Global Telecommunications Conference, (2006)
[7]
NAGIREDDYGARI D, THOMAS J., MAC-TCP cross-layer attack and its defense in cognitive radio networks, Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 71-78, (2014)
[8]
WANG W K, SUN Y, LI H S, Et al., Cross-layer attack and defense in cognitive radio networks, Proceedings of IEEE Global Telecommunications Conference, (2010)
[9]
HOSSAIN M, XIE J., Off-sensing and route manipulation attack: a cross-layer attack in cognitive radio based wireless mesh networks, Proceedings of IEEE Conference on Computer Communications, pp. 1376-1384, (2018)
[10]
HASAN K, SHETTY S, OYEDARE T., Cross layer attacks on GSM mobile networks using software defined radios, Proceedings of 14th IEEE Annual Consumer Communications & Networking Conference, pp. 357-360, (2017)